Exam Code | SY0-501 |
Exam Name | CompTIA Security+ Exam 2021 |
Questions | 929 Questions Answers With Explanation |
Update Date | November 08,2024 |
Price |
Was : |
Are you ready to take your career to the next level with CompTIA Security+ Exam 2021? At Prep4Certs, we're dedicated to helping you achieve your goals by providing high-quality SY0-501 Dumps and resources for a wide range of certification exams.
At Prep4Certs, we're committed to your success in the CompTIA SY0-501 exam. Our comprehensive study materials and resources are designed to equip you with the knowledge and skills needed to ace the exam with confidence:
Start Your Certification Journey Today
Whether you're looking to advance your career, expand your skill set, or pursue new opportunities, Prep4Certs is here to support you on your certification journey. Explore our comprehensive study materials, take your exam preparation to the next level, and unlock new possibilities for professional growth and success.
Ready to achieve your certification goals? Begin your journey with Prep4Certs today!
A systems administrator recently issued a public/private key pair that will be used tor the company's DNSSEC implementation Which of the following configurations should the systems administrator implement NEXT?
A. Create DNSKEY resources with the public key.
B. instant private key using the RRSIG record
C. Point the OS record to the company authoritative servers
D. Add TCP port 443 to the DNS listener
Joe a new employee, discovered a thumb drive with the company's logo on it while walking in the parking lot Joe was curious as to the contents of the drive and placed it into his work computer. Shortly after accessing the contents, he noticed the machine was running slower, started to reboot, and displayed new icons on the screen Which of the following types of attacks occurred?
A. Social engineering
B. Brute force attack
C. MITM
D. DoS
A company has users and porters in multiple geographic locations and the printers are locked in common areas of the offices. To preserve the confidentially of PII, a security administrator needs to implement the appropriate controls Which of the following would BEST meet the confidentiality requirements of the data?
A. Enforcing location-based policy restrictions
B. Adding location to the standard naming convention
C. implementing time-of-day restrictions based on location
D. Conducting regular account maintenance at each location
An organization is updating its access control standards for SSL VPN login to include multifactor authentication The security administrator assigned to this project has been given the following guidelines to use when selecting a solution• High security• Lowest false acceptance rate• Quick provisioning time for remote users and offshore consultantsWhich of the following solutions will BEST fit this organization's requirements?
A. AES-256 key fobs
B. Software tokens
C. Fingerprint scanners
D. Iris scanners
A security analyst is investigating a security breach involving the loss of sensitive data. A user passed the information through social media as vacation photos. Which of the following methods was used to encode the data?
A. Obfuscation
B. Steganography
C. Hashing
D. Elliptic curve
Which of the following Is a resiliency strategy that allows a system to automatically adapt to workload changes?
A. Fault tolerance
B. Redundancy
C. Elasticity
D. High availability
Which of the following is the main difference between symmetric end asymmetric cryptographic algorithms?
A. The use of PKI in symmetric algorithms
B. HSM-based key generation
C. Only one Key used in symmetric algorithms
D. Random vs pseudo-random key generation
As a security measure, an organization has disabled all external media from accessing the network Since some users may have data that needs to be transferred to the network, which of the would BEST assist a security administrator with transferring the data while keeping the internal network secure?
A. Upload the media in the DMZ
B. Upload the data in a separate VLAN
C. Contact the data custodian
D. Use a standalone scanning system
Which of the following BEST describes why an air gap is a useful security control?
A. It physically isolates two or more networks, therefore helping prevent cross
contamination or accidental data spillage.
B. It requires that files be transferred via USB instead of networks that are potentially
vulnerable to hacking, therefore preventing virus infections.
C. It requires multiple systems administrators with different credentials, therefore providing
separation of duties.
D. It provides physical space between two interlocking doors, therefore providing additional
control from unauthorized entry.
A developer is creating a new web application on a public cloud platform and wants to ensure the application can respond to increase in load while minimizing costs during periods of low usage. Which of the following strategies is MOST relevant to the use-case?
A. Elasticity
B. Redundancy
C. High availability
D. Non-persistence